Sciweavers

1548 search results - page 221 / 310
» Estimating Software Vulnerabilities
Sort
View
SERP
2008
15 years 22 days ago
Mapping Data-Flow Dependencies onto Distributed Embedded Systems
Model-driven development (MDD) is an emerging paradigm and has become state-of-the-art for embedded systems software design. In the overall design process, several steps have to be...
Stefan Kugele, Wolfgang Haberl
AVI
2006
15 years 21 days ago
Navigation in degree of interest trees
We present an experiment that compares how people perform search tasks in a degree-of-interest browser and in a Windows-Explorer-like browser. Our results show that, whereas users...
Raluca Budiu, Peter Pirolli, Michael Fleetwood
BMCBI
2006
97views more  BMCBI 2006»
14 years 11 months ago
PDA: Pooled DNA analyzer
Background: Association mapping using abundant single nucleotide polymorphisms is a powerful tool for identifying disease susceptibility genes for complex traits and exploring pos...
Hsin-Chou Yang, Chia-Ching Pan, Chin-Yu Lin, Cathy...
CLEIEJ
2002
156views more  CLEIEJ 2002»
14 years 11 months ago
A Fuzzy Model for Function Point Analysis to Development and Enhancement Project Assessments
Function Point Analysis (FPA) is among the most commonly used techniques to estimate the size of software system projects or software systems. During the point counting process th...
Osias de Souza Lima Júnior, Pedro Porf&iacu...
TCOS
2010
14 years 6 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...